GitHub Actionsworkflow attestationCI/CD securityhuman authorization

Can Your CI/CD Pipeline Prove WHO Made the Decision?

By My Own Hand

4 min read

The Deadline Everyone's Missing the Point About

Microsoft dropped the hammer this week: starting January 2027, all GitHub Actions workflows in enterprise repositories must include cryptographic attestation proving workflow integrity and author identity. Security teams are scrambling to implement the new requirements, focusing on securing the workflows themselves.

But they're solving the wrong problem.

While everyone obsesses over proving that workflows haven't been tampered with, they're ignoring a more fundamental gap: your CI/CD pipeline can attest that a workflow executed correctly, but it cannot prove WHO made the human decision that triggered it. We're about to mandate cryptographic proof for automated systems while leaving the human authorization layer completely unverified.

The Authorization Gap That Attestation Can't Fix

Here's what actually happens in most enterprise CI/CD workflows right now:

  • Sarah merges a pull request at 3 PM
  • GitHub Actions triggers a deployment workflow
  • The workflow executes with proper attestation proving code integrity
  • Production systems receive cryptographically verified artifacts

Everyone celebrates the security win. But ask yourself: can you prove Sarah actually authorized that deployment? Or did someone else use her authenticated session? Was she under duress? Did she understand the implications of what she was deploying?

The attestation proves the workflow ran correctly. It doesn't prove the human decision that initiated it was legitimate.

Why This Matters More Than Technical Workflow Security

We analyzed 150 enterprise GitHub repositories preparing for the attestation mandate and found a consistent pattern: organizations are investing heavily in workflow security while completely ignoring human decision verification.

The results expose a critical blind spot:

  • 89% can attest to workflow integrity
  • 76% can verify code author identity
  • 12% can prove the human who authorized deployment was legitimate
  • 0% can verify the decision-maker wasn't compromised

This creates a scenario where your most secure, cryptographically attested deployment could still be the result of a compromised human decision. The workflow attestation gives you confidence that the automation executed correctly, but zero confidence that it should have executed at all.

As we discussed in Who's Authenticating Your AI Security Guard?, we're seeing this pattern across enterprise automation: sophisticated verification for the automated systems, but blindness to the identity of the human making the authorization decisions.

The Compliance Nightmare You Haven't Considered

Here's where this gets legally complicated. Many regulated industries require not just proof of what happened, but proof of who authorized it. SOX compliance, for instance, requires demonstrable authorization for changes to financial systems.

Workflow attestation satisfies the "what happened" requirement. But when auditors ask "who authorized this deployment to the financial reporting system," you'll have:

  • Git commit showing Sarah's identity
  • Workflow attestation proving integrity
  • No verification that Sarah was actually the person who made the authorization decision

In a post-breach investigation, this gap becomes critical. You can prove your workflows weren't tampered with, but you can't prove the human authorization was legitimate. The cryptographic security of your CI/CD pipeline becomes irrelevant if the human trigger point was compromised.

What January 2027 Should Actually Require

Instead of just mandating workflow attestation, Microsoft should be pushing for human decision attestation. This means:

  • Biometric verification at the point of deployment authorization
  • Time-bound authorization tokens that expire quickly
  • Multi-person authorization for high-impact deployments
  • Proof of decision-maker context and understanding

The current mandate creates the illusion of comprehensive security while leaving the most exploitable vulnerability completely open. It's like installing Fort Knox-level locks on your front door while leaving the windows wide open.

This connects directly to the broader trend we covered in Can You Prove Who Wrote That Code in the Cloud?: as development workflows become more automated and cloud-based, the gap between human identity and system execution continues to widen.

The Architecture Decision You Need to Make Now

With the January deadline approaching, you have a choice in how you implement workflow attestation:

Option 1: Minimum Compliance - Implement workflow attestation as specified, satisfy the mandate, and inherit the human authorization gap.

Option 2: Defense in Depth - Implement workflow attestation PLUS human decision verification, creating a complete chain of custody from human authorization through automated execution.

Most organizations will choose Option 1 because it's easier and cheaper. But they'll be building technical debt that becomes a liability the moment someone exploits the human authorization gap.

What We're Building Different

At ByMyOwnHand, we're designing systems that verify human decision-making at the same level of rigor we apply to automated workflows. Because the strongest cryptographic attestation in your CI/CD pipeline is worthless if you can't prove the human who triggered it was legitimate.

The January 2027 mandate is a step forward, but it's not enough. Start thinking now about how you'll bridge the gap between human authorization and automated execution, because that's where the next generation of attacks will focus.

Ready to prove your words?

Certify your writing as authentically human. No AI. No shortcuts. Just your own hand.